Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\Db5aU9VNyz.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\Db5aU9VNyz.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\Db5aU9VNyz.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\Db5aU9VNyz.dll,DllRegisterServer
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Db5aU9VNyz.dll",#1
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FF8E83B6000
|
unkown
|
page read and write
|
||
1A4D6831000
|
direct allocation
|
page execute and read and write
|
||
256F1681000
|
direct allocation
|
page execute and read and write
|
||
7FF8E83B6000
|
unkown
|
page read and write
|
||
C21000
|
direct allocation
|
page execute and read and write
|
||
7FF8E83B6000
|
unkown
|
page read and write
|
||
7FF8E83B6000
|
unkown
|
page read and write
|
||
22A4F571000
|
direct allocation
|
page execute and read and write
|
||
256F1491000
|
heap
|
page read and write
|
||
1A4D68B5000
|
heap
|
page read and write
|
||
AA9000
|
heap
|
page read and write
|
||
7FF8E83B5000
|
unkown
|
page readonly
|
||
22A4F540000
|
heap
|
page read and write
|
||
B05000
|
heap
|
page read and write
|
||
1A4D68B2000
|
heap
|
page read and write
|
||
22A4F608000
|
heap
|
page read and write
|
||
1A4D6888000
|
heap
|
page read and write
|
||
7FF8E83B5000
|
unkown
|
page readonly
|
||
256F2F24000
|
heap
|
page read and write
|
||
AE1000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
256F16B0000
|
heap
|
page read and write
|
||
7FF8E83B1000
|
unkown
|
page execute read
|
||
7FF8E83B5000
|
unkown
|
page readonly
|
||
AAB000
|
heap
|
page read and write
|
||
6DE393C000
|
stack
|
page read and write
|
||
22A4F5E0000
|
heap
|
page read and write
|
||
256F1485000
|
heap
|
page read and write
|
||
22A4F633000
|
heap
|
page read and write
|
||
256F1482000
|
heap
|
page read and write
|
||
AFD000
|
heap
|
page read and write
|
||
256F1485000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
1A4D6780000
|
heap
|
page read and write
|
||
22A4F61A000
|
heap
|
page read and write
|
||
256F1420000
|
heap
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
256F148D000
|
heap
|
page read and write
|
||
22A4F5ED000
|
heap
|
page read and write
|
||
22A51033000
|
heap
|
page read and write
|
||
4FE86FF000
|
stack
|
page read and write
|
||
1A4D6AA5000
|
heap
|
page read and write
|
||
B05000
|
heap
|
page read and write
|
||
6DE3C7F000
|
stack
|
page read and write
|
||
AB7000
|
heap
|
page read and write
|
||
22A4F5F8000
|
heap
|
page read and write
|
||
22A51085000
|
heap
|
page read and write
|
||
256F1450000
|
heap
|
page read and write
|
||
1A4D83D4000
|
heap
|
page read and write
|
||
6B1FEAC000
|
stack
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
256F1489000
|
heap
|
page read and write
|
||
256F16BC000
|
heap
|
page read and write
|
||
7FF8E83B0000
|
unkown
|
page readonly
|
||
7FF8E83B1000
|
unkown
|
page execute read
|
||
22A4F637000
|
heap
|
page read and write
|
||
1A4D6860000
|
heap
|
page read and write
|
||
256F4BC0000
|
trusted library allocation
|
page read and write
|
||
7FF8E83B0000
|
unkown
|
page readonly
|
||
ADD000
|
heap
|
page read and write
|
||
1A4D6AA0000
|
heap
|
page read and write
|
||
6B1FF2F000
|
stack
|
page read and write
|
||
256F3020000
|
heap
|
page read and write
|
||
256F16B5000
|
heap
|
page read and write
|
||
6B202FE000
|
stack
|
page read and write
|
||
4FE88FB000
|
stack
|
page read and write
|
||
22A4F530000
|
heap
|
page read and write
|
||
4FE87FE000
|
stack
|
page read and write
|
||
256F1486000
|
heap
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
22A4F63F000
|
heap
|
page read and write
|
||
24BB000
|
stack
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
1A4D6880000
|
heap
|
page read and write
|
||
1A4D83D0000
|
heap
|
page read and write
|
||
256F147C000
|
heap
|
page read and write
|
||
7FF8E83D5000
|
unkown
|
page readonly
|
||
7FF8E83B0000
|
unkown
|
page readonly
|
||
256F1485000
|
heap
|
page read and write
|
||
256F13F0000
|
heap
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
256F1489000
|
heap
|
page read and write
|
||
1A4D68B6000
|
heap
|
page read and write
|
||
AD6000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
7FF8E83B0000
|
unkown
|
page readonly
|
||
22A4F5B0000
|
heap
|
page read and write
|
||
256F1458000
|
heap
|
page read and write
|
||
1A4D68A8000
|
heap
|
page read and write
|
||
22A4F611000
|
heap
|
page read and write
|
||
256F1488000
|
heap
|
page read and write
|
||
7FF8E83B5000
|
unkown
|
page readonly
|
||
7FF8E83D5000
|
unkown
|
page readonly
|
||
1A4D68AC000
|
heap
|
page read and write
|
||
22A4F63F000
|
heap
|
page read and write
|
||
7FF8E83B1000
|
unkown
|
page execute read
|
||
7FF8E83D5000
|
unkown
|
page readonly
|
||
AD6000
|
heap
|
page read and write
|
||
22A4F611000
|
heap
|
page read and write
|
||
4FE834C000
|
stack
|
page read and write
|
||
256F1478000
|
heap
|
page read and write
|
||
6DE3CFB000
|
stack
|
page read and write
|
||
7FF8E83D5000
|
unkown
|
page readonly
|
||
1A4D68B5000
|
heap
|
page read and write
|
||
AE8000
|
heap
|
page read and write
|
||
6B1FFAE000
|
stack
|
page read and write
|
||
87B000
|
stack
|
page read and write
|
||
256F147C000
|
heap
|
page read and write
|
||
25F3000
|
heap
|
page read and write
|
||
256F2F20000
|
heap
|
page read and write
|
||
7FF8E83B1000
|
unkown
|
page execute read
|
||
256F1478000
|
heap
|
page read and write
|
||
1A4D68CA000
|
heap
|
page read and write
|
||
22A51080000
|
heap
|
page read and write
|
||
22A50F70000
|
heap
|
page read and write
|
||
256F1400000
|
heap
|
page read and write
|
||
1A4D67A0000
|
heap
|
page read and write
|
||
6DE3D7F000
|
stack
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
1A4D68AC000
|
heap
|
page read and write
|
||
1A4D68B5000
|
heap
|
page read and write
|
||
1A4D66A0000
|
heap
|
page read and write
|
||
1A4D68A3000
|
heap
|
page read and write
|
||
22A4F622000
|
heap
|
page read and write
|
||
256F148A000
|
heap
|
page read and write
|
||
C95000
|
heap
|
page read and write
|
||
22A51030000
|
heap
|
page read and write
|
||
256F2E60000
|
heap
|
page read and write
|
||
22A4F63E000
|
heap
|
page read and write
|
||
256F1487000
|
heap
|
page read and write
|
||
6DE39BF000
|
stack
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
There are 122 hidden memdumps, click here to show them.